Siga este enlace para ver otros tipos de publicaciones sobre el tema: Hackers.

Artículos de revistas sobre el tema "Hackers"

Crea una cita precisa en los estilos APA, MLA, Chicago, Harvard y otros

Elija tipo de fuente:

Consulte los 50 mejores artículos de revistas para su investigación sobre el tema "Hackers".

Junto a cada fuente en la lista de referencias hay un botón "Agregar a la bibliografía". Pulsa este botón, y generaremos automáticamente la referencia bibliográfica para la obra elegida en el estilo de cita que necesites: APA, MLA, Harvard, Vancouver, Chicago, etc.

También puede descargar el texto completo de la publicación académica en formato pdf y leer en línea su resumen siempre que esté disponible en los metadatos.

Explore artículos de revistas sobre una amplia variedad de disciplinas y organice su bibliografía correctamente.

1

Hausken, Kjell. "Information Sharing Among Cyber Hackers in Successive Attacks." International Game Theory Review 19, no. 02 (2017): 1750010. http://dx.doi.org/10.1142/s0219198917500104.

Texto completo
Resumen
Supplementing the literature on information sharing between firms, the paper seeks to understand information sharing between hackers and how firms defend against increasingly sophisticated hackers. Each hacker seeks financial gain, mutually beneficial information exchange, and reputation gain. The two hackers’ attack and the firm’s defense are inverse U shaped in each other. A hacker shifts from attack to information sharing when attack is costly or the firm’s defense is cheap. The first hacker’s information sharing increases as both hackers focus increasingly on reputation gain. The two hacke
Los estilos APA, Harvard, Vancouver, ISO, etc.
2

Odemis, Murat, Cagatay Yucel, and Ahmet Koltuksuz. "Detecting User Behavior in Cyber Threat Intelligence: Development of Honeypsy System." Security and Communication Networks 2022 (January 27, 2022): 1–28. http://dx.doi.org/10.1155/2022/7620125.

Texto completo
Resumen
This research demonstrates a design of an experiment of a hacker infiltrating a server where it is assumed that the communication between the hacker and the target server is established, and the hacker also escalated his rights on the server. Therefore, the honeypot server setup has been designed to reveal the correlation of a hacker’s actions with that of the hacker’s experience, personality, expertise, and psychology. To the best of our knowledge, such a design of experiment has never been tested rigorously on a honeypot implementation except for self-reporting tests applied to hackers in th
Los estilos APA, Harvard, Vancouver, ISO, etc.
3

Bátfai, Norbert, Renátó Besenczi, József Szabó, et al. "DEAC-Hackers: játszó hackerek, hackelő játékosok." Információs Társadalom 18, no. 1 (2018): 132. http://dx.doi.org/10.22503/inftars.xviii.2018.1.9.

Texto completo
Resumen
Klasszikus értelmezésben a hacker a kifinomult problémákat kifinomultan kezelni képes szakértő. Tipikusan programozó, de ugyanúgy mutathat hacker attitűdöket, lehet hacker egy művész, egy feltaláló, egy tudós vagy egy sportoló is. Ebben a cikkben azt mutatjuk be, hogyan lehet hacker egy e-sportoló játékos. A hacker természetéből fakadóan autodidakta, de a tanulási folyamat formális eszközökkel segíthető, katalizálható. A mi ilyen formális keretünk a Debreceni Egyetem Atlétikai Clubjának (DEAC) nemrégiben megalakított e-sport szakosztálya, a cikkben bemutatott DEAC-Hackers. 
 
 ---&#x
Los estilos APA, Harvard, Vancouver, ISO, etc.
4

Hausken, Kjell. "Proactivity and Retroactivity of Firms and Information Sharing of Hackers." International Game Theory Review 20, no. 01 (2018): 1750027. http://dx.doi.org/10.1142/s021919891750027x.

Texto completo
Resumen
One firm defends proactively or retroactively against a first hacker, and thereafter against a second hacker, in four four-period games. The hackers share information for financial gain, mutual advantage, and reputation. The first hacker’s attack and information sharing are strategic substitutes. When the firm is proactive in period 1, the first hacker’s information sharing decreases as the second hacker’s attack cost increases. The deterring effort in eight corner solutions is proportional to the deterred player’s valuation and inverse proportional to the deterred player’s unit effort cost. W
Los estilos APA, Harvard, Vancouver, ISO, etc.
5

Nycyk, Michael. "The New Computer Hacker’s Quest and Contest with the Experienced Hackers: A Qualitative Study applying Pierre Bourdieu’s Field Theory." International Journal of Cyber Criminology 10, no. 2 (2016): 92–109. https://doi.org/10.5281/zenodo.163402.

Texto completo
Resumen
Hacker forums are places for new hackers, newbies, to find information on hacking practices and to become part of a community. This study contributes to understanding ways newbies try to become accepted experienced computer hackers. Using Pierre Bourdieu’s Field Theory and its concepts, 500 threads from a forum were analyzed to see how newbies attempt to gain a place in the hacking field amongst experienced hackers. Thematic analysis methods were used to demonstrate how the forum’s field, and those within it, behaved to obtain what Bourdieu describes as cultural and social capital to obtain kn
Los estilos APA, Harvard, Vancouver, ISO, etc.
6

Cekerevac, Zoran, Zdenek Dvorak, Ludmila Prigoda, and Petar Cekerevac. "Hacking, Protection and the Consequences of Hacking Hacking, Protection and the Consequences of Hacking." Communications - Scientific letters of the University of Zilina 20, no. 2 (2018): 83–87. http://dx.doi.org/10.26552/com.c.2018.2.83-87.

Texto completo
Resumen
Understanding the term hacking as any unconventional way of interacting with some system it is easy to conclude that there are enormous number of people who hacked or tried to hack someone or something. The article, as result of author research, analyses hacking from different points of view, including hacker’s point of view as well as the defender’s point of view. Here are discussed questions like: Who are the hackers? Why do people hack? Law aspects of hacking, as well as some economic issues connected with hacking. At the end, some questions about victim protection are discussed together wi
Los estilos APA, Harvard, Vancouver, ISO, etc.
7

Deepti, Chaudhari1 Hetvi Patel2 Anushri Ghosh3 Neha Patil4 Vikas Pawar5 Yogesh Sonawane6. "A Survey on Image steganography using Genetic Algorithm." Scandinavian Journal of Information Systems 35, no. 1 (2023): 131–35. https://doi.org/10.5281/zenodo.7858158.

Texto completo
Resumen
Nowadays technologies are increasing very rapidly, and with the rise of these technologies the world is now open to everyone, and nothing is hidden. This gives an advantage to the hackers to hack the information and misuse it. Using our personal data for malicious purposes is very harmful for everyone. In this open world some of the data should be very confidential and should not be able to be hacked by the hackers. Here, in our work, we have designed the model that would hide the confidential data from the hackers in such a way that even if the hacker retrieves the data or file, but the hacke
Los estilos APA, Harvard, Vancouver, ISO, etc.
8

Guo, Boyu. "Why Hackers Become Crackers – An Analysis of Conflicts Faced by Hackers." Public Administration Research 5, no. 1 (2016): 29. http://dx.doi.org/10.5539/par.v5n1p29.

Texto completo
Resumen
<p>Hacker culture is generally regarded as a subculture, and the public has a high degree of misunderstanding towards hackers. The media reports sometimes depict hackers overly negatively, possibly because hackers could gain a dominant position in the age of information and, therefore, threaten the existing balance of social power distribution. Moreover, those reports, whether intentionally or not, misunderstand the meaning of “hackers”: “Hackers” are people who want to identify and solve problems directly and effectively, but “crackers” are those who cause problems for society.</p&gt
Los estilos APA, Harvard, Vancouver, ISO, etc.
9

Al-Ajlouni, Mahmoud Mohammad. "Human Resources and their Tendency to Information Security Crimes Based on Holland Theory." Information Resources Management Journal 31, no. 4 (2018): 44–58. http://dx.doi.org/10.4018/irmj.2018100103.

Texto completo
Resumen
Security systems are often the target of cyber-criminals and professional hackers, but often they fail in hiding all traces of the attack, thereby leaving critical evidence that could lead to identifying and arresting the criminal. However, hacking skills vary from one hacker to another depending on the hacker's personal traits, behavior, and intellectual tendencies. The aim of this study is to develop a proposed descriptive model of the behavioral patterns and motives of hackers based on programmable psychological theories, modeled using object-oriented programming models. The study proposes
Los estilos APA, Harvard, Vancouver, ISO, etc.
10

Scariot Esquivel, Nelson. "Hackers, política y revolución." Question/Cuestión 3, no. 72 (2022): E716. http://dx.doi.org/10.24215/16696581e716.

Texto completo
Resumen
El siguiente artículo está basado en el capítulo tres de mi tesina de grado La cultura hacker como filosofía de vida en la era del capitalismo cibernético. Una aproximación al caso en Mendoza. Aquí analizamos el potencial revolucionario de les hackers frente al actual sistema económico, político e informático que gobierna el mundo: el capitalismo cibernético (Tiqqun, 2016). Centrándonos en el aspecto político y filosófico de la cultura hacker. En efecto, buscamos responder a las siguientes preguntas: ¿Pueden los/as hackers constituirse en una clase política? ¿Por qué pensar a los/as hackers en
Los estilos APA, Harvard, Vancouver, ISO, etc.
11

Bratus, Sergey. "Hacker Curriculum : How Hackers Learn Networking." IEEE Distributed Systems Online 8, no. 10 (2007): 2. http://dx.doi.org/10.1109/mdso.2007.4384582.

Texto completo
Los estilos APA, Harvard, Vancouver, ISO, etc.
12

Banda, Raphael, Jackson Phiri, Mayumbo Nyirenda, and Monica M. Kabemba. "Technological Paradox of Hackers Begetting Hackers: A Case of Ethical and Unethical Hackers and their Subtle Tools." Zambia ICT Journal 3, no. 1 (2019): 40–51. http://dx.doi.org/10.33260/zictjournal.v3i1.74.

Texto completo
Resumen
Computer crimes have been in existence for a long time now and hacking is just another way or tool that hackers are now using to perpetrate crime in different form. Hackers Beget Ethical Hackers. A number of people have suffered the consequences of hacker actions. We need to know who these hackers are. We need to know why these hackers exist because hackers have been there and will be there and we can be victims of their existence. In essence hackers seem to beget hackers and the tools that they use are getting more and more advanced by the day. We shall take a quick analysis of selected tools
Los estilos APA, Harvard, Vancouver, ISO, etc.
13

Atul, Kulkarni, and Mukhopadhyay Debajyoti. "Data Spread among Vehicular Networks with Minimal Cost and Privacy." Indonesian Journal of Electrical Engineering and Computer Science 9, no. 1 (2018): 111–14. https://doi.org/10.11591/ijeecs.v9.i1.pp111-114.

Texto completo
Resumen
Currently, choosing a node to carry the files via network is inefficient due to multiple end-users are requesting for packets at the same time. The problem is to identify the shortest path, traffic cost is high, and hackers enter the network to access the file. Whenever user requesting for packets to service provider, it has been carried out via router to provide security and effective way of transmission without any hackers. We proposed a VAN router that manages the transmission process. Once the packet enters router follows: (i) identifies the shortest path to transmit the packets, (ii) anal
Los estilos APA, Harvard, Vancouver, ISO, etc.
14

Bellaby, Ross W. "An Ethical Framework for Hacking Operations." Ethical Theory and Moral Practice 24, no. 1 (2021): 231–55. http://dx.doi.org/10.1007/s10677-021-10166-8.

Texto completo
Resumen
AbstractIn recent years the power and reach of prominent hacker groups such as Anonymous and LulzSec has been clearly demonstrated. However, in a world where hackers are able to wield significant online power, can they do so ethically as legitimate agents? To answer this question this paper will develop an ethical framework based on the premise that hackers have exhibited instances where they have acted to protect people from harm at a time when there was no one else to do so. At its core this paper will argue that political hacking can be justified when it is done to protect the vital interes
Los estilos APA, Harvard, Vancouver, ISO, etc.
15

Warren, Matthew, and Shona Leitch. "Hacker Taggers: A new type of hackers." Information Systems Frontiers 12, no. 4 (2009): 425–31. http://dx.doi.org/10.1007/s10796-009-9203-y.

Texto completo
Los estilos APA, Harvard, Vancouver, ISO, etc.
16

Kulkarni, Atul, and Debajyoti Mukhopadhyay. "Data Spread among Vehicular Networks with Minimal Cost and Privacy." Indonesian Journal of Electrical Engineering and Computer Science 9, no. 1 (2018): 111. http://dx.doi.org/10.11591/ijeecs.v9.i1.pp111-114.

Texto completo
Resumen
<p>Currently, choosing a node to carry the files via network is inefficient due to multiple end-users are requesting for packets at the same time. The problem is to identify the shortest path, traffic cost is high, and hackers enter the network to access the file. Whenever user requesting for packets to service provider, it has been carried out via router to provide security and effective way of transmission without any hackers. We proposed a VAN router that manages the transmission process. Once the packet enters router follows: (i) identifies the shortest path to transmit the packets,
Los estilos APA, Harvard, Vancouver, ISO, etc.
17

Isnarti, Rika. "The Role of China’s Patriotic Hackers and Their Relationship to the Government." Andalas Journal of International Studies (AJIS) 4, no. 2 (2015): 161. http://dx.doi.org/10.25077/ajis.4.2.161-180.2015.

Texto completo
Resumen
China is one of countries around the world known for the use of patriotic hackers who conduct many cyber-attacks. Patriotic hackers tend to be linked to nationalist movements or work for the government. For example, when ethnic Chinese were blamed for violent riots in Indonesia in 1998, Chinese patriotic hackers attacked Indonesian government websites in protest. Patriotic hackers also blocked CNN’s website during Beijing Olympics in 2008 because it reported protests in Tibet and reported bad news about China as Olympic host. They also attacked Vietnamese websites reporting conflict with China
Los estilos APA, Harvard, Vancouver, ISO, etc.
18

Mohsin, Rashid Shaikh, and Sunil Sangle Harshal. "Moral Hacking & Hacking Assaults." Recent Innovations in Wireless Network Security 6, no. 1 (2023): 1–5. https://doi.org/10.5281/zenodo.10039412.

Texto completo
Los estilos APA, Harvard, Vancouver, ISO, etc.
19

Laksmiati, Dewi. "Vulnerability Assessment with Network-Based Scanner Method for Improving Website Security." Journal of Computer Networks, Architecture and High Performance Computing 5, no. 1 (2023): 38–45. http://dx.doi.org/10.47709/cnahpc.v5i1.1991.

Texto completo
Resumen
The digital world has seen a significant increase in security threats in recent years, with hacker attacks on websites being a major concern in cybersecurity. One platform that is particularly vulnerable is WordPress, which is widely used and therefore a popular target for hackers. About 95.62% hacked website in 2021 is WordPress based site. Therefore, to improve website security we conducted a vulnerability assessment on a WordPress based website, in order to identify vulnerabilities that may be exploited by hackers. To do the vulnerability assessment, we used the network-based scanner based
Los estilos APA, Harvard, Vancouver, ISO, etc.
20

Manik, Burju Manik, and Imran Lubis. "Perbandingan Kinerja Ipcop dengan Honeypot dalam Mengamankan Server Linux dari Serangan Hacker." Jurnal Ilmu Komputer dan Sistem Komputer Terapan (JIKSTRA) 3, no. 1 (2021): 34–41. http://dx.doi.org/10.35447/jikstra.v3i1.356.

Texto completo
Resumen
Research to install IPCop and honeypot on server computers and implement IPCop by way of configuration to protect the server from unauthorized parties. The software used in this research is IPCop, Manjaro Linux, Shootpress, Windows 10, and Virtual Box. The results of this study indicate that the implementation of IPCop as a security system on the server can be done and can run well. IPCop is able to protect servers from hacker attacks very well, even using IPCop hackers are not able to ping the server, so hackers cannot find out information about the target server. Honeypot implementation as a
Los estilos APA, Harvard, Vancouver, ISO, etc.
21

Renushka, Madarie. "Hackers' Motivations: Testing Schwartz's Theory of Motivational Types of Values in a Sample of Hackers." International Journal of Cyber Criminology 11, no. 1 (2017): 78–97. https://doi.org/10.5281/zenodo.495773.

Texto completo
Resumen
<em>Although much has been written on topic of hacker motivations, little empirical research has been conducted and even less research has attempted to quantify hackers’ motivations. The present study analyses relationships between the frequency of several hacking behaviours and motivations to hack in a sample of male hackers and potential hackers. Motivations frequently recurring in the literature are assessed and Schwartz´s (1992) Theory of Motivational Types of Values is applied. A preference for self-transcendence and openness to change values was found in the whole sample. Intellectual ch
Los estilos APA, Harvard, Vancouver, ISO, etc.
22

Dogra, Mrs Shallu, Nitin Singh, and Ayush Sahil. "A REVIEW PAPER ON ETHICAL HACKING." INTERANTIONAL JOURNAL OF SCIENTIFIC RESEARCH IN ENGINEERING AND MANAGEMENT 08, no. 09 (2024): 1–5. http://dx.doi.org/10.55041/ijsrem37588.

Texto completo
Resumen
Ethical Hacking is a proactive approach to cybersecurity that involves authorizing and systematically testing information systems to find vulnerabilities before they can be exploited by criminals. Ethical hackers are network and computer experts who attack security systems on behalf of their owners, looking for vulnerabilities that can be exploited by malicious hackers. The explosive growth of the Internet has given rise to many good things, including electronic commerce, email, collaborative computing, and new areas of advertising and information distribution. Ethical hacking, also known as p
Los estilos APA, Harvard, Vancouver, ISO, etc.
23

Wu, Yong, Junlin Duan, Tao Dai, and Dong Cheng. "Managing Security Outsourcing in the Presence of Strategic Hackers." Decision Analysis 17, no. 3 (2020): 235–59. http://dx.doi.org/10.1287/deca.2019.0406.

Texto completo
Resumen
Nowadays, firms tend to outsource security operations to professional managed security service providers (MSSPs) as a result of the sophistication of strategic hackers. Thus, how an MSSP makes security decisions according to a strategic hacker’s action is worth researching. Constructing a contract theory model, this paper examines the interaction between an MSSP and a strategic hacker based on both parties’ characteristics. We find that the hacker will give up less valuable information assets, and thus not all information assets are worth protecting for the MSSP. For both parties, their optima
Los estilos APA, Harvard, Vancouver, ISO, etc.
24

Al-Tarawneh, Ahmed, and Ja’afer Al-Saraireh. "Efficient detection of hacker community based on twitter data using complex networks and machine learning algorithm." Journal of Intelligent & Fuzzy Systems 40, no. 6 (2021): 12321–37. http://dx.doi.org/10.3233/jifs-210458.

Texto completo
Resumen
Twitter is one of the most popular platforms used to share and post ideas. Hackers and anonymous attackers use these platforms maliciously, and their behavior can be used to predict the risk of future attacks, by gathering and classifying hackers’ tweets using machine-learning techniques. Previous approaches for detecting infected tweets are based on human efforts or text analysis, thus they are limited to capturing the hidden text between tweet lines. The main aim of this research paper is to enhance the efficiency of hacker detection for the Twitter platform using the complex networks techni
Los estilos APA, Harvard, Vancouver, ISO, etc.
25

Jeong, Sarah, and Colin McSwiggen. "Hackers!" XRDS: Crossroads, The ACM Magazine for Students 20, no. 4 (2014): 38–42. http://dx.doi.org/10.1145/2604998.

Texto completo
Los estilos APA, Harvard, Vancouver, ISO, etc.
26

Hollinger, Richard C. "Hackers." ACM SIGCAS Computers and Society 21, no. 1 (1991): 6–17. http://dx.doi.org/10.1145/122246.122248.

Texto completo
Los estilos APA, Harvard, Vancouver, ISO, etc.
27

Wark, McKenzie. "Hackers." Theory, Culture & Society 23, no. 2-3 (2006): 320–22. http://dx.doi.org/10.1177/026327640602300242.

Texto completo
Los estilos APA, Harvard, Vancouver, ISO, etc.
28

Maxigas. "Hackers against technology: Critique and recuperation in technological cycles." Social Studies of Science 47, no. 6 (2017): 841–60. http://dx.doi.org/10.1177/0306312717736387.

Texto completo
Resumen
I offer an interpretation of hackers’ technological choices through a theoretical framework of critique and recuperation in technological cycles, building on prior research that brings the pragmatic sociology of Boltanski and Chiapello to bear on matters in Science and Technology Studies. I argue that contextualizing technology choices in the development of capitalism through innovation illuminates their political significance. I start with the counterintuitive observation that some browser extensions popular with hackers, like RequestPolicy, make it considerably harder for them to look at web
Los estilos APA, Harvard, Vancouver, ISO, etc.
29

Dudchik, Andrei Yu. "Partisans go cyber: The hacker ethic and partisans’ legacy." Vestnik of Saint Petersburg University. Philosophy and Conflict Studies 39, no. 2 (2023): 322–39. http://dx.doi.org/10.21638/spbu17.2023.209.

Texto completo
Resumen
The article discusses the role of hackers and hacktivists in modern hybrid conflicts, in particular the ‘localization’ patterns of hackerism, by focusing on the case of the Belarusian hacker group Cyber Partisans. The study shows the significance of the partisan movement for modern Belarusian identity and historical memory and discusses the attempts of appropriation of this topic by various political actors. The comparison between hacktivism and partisan warfare holds a certain heuristic potential, making it possible to build conceptual categories for the analysis of the hacktivists’ practices
Los estilos APA, Harvard, Vancouver, ISO, etc.
30

Aguado, Alexandre Garcia, and Isabel Alvarez Canovas. "Cultura hacker e educação: percepções dos hackers sobre a vivência de elementos de sua cultura nas escolas." Perspectiva 39, no. 3 (2021): 1–18. http://dx.doi.org/10.5007/2175-795x.2021.e81052.

Texto completo
Resumen
Partindo da compreensão de que vivemos em sociedades em que as possibilidades e as opressões, em alguma medida, estão relacionadas às dinâmicas tecnológicas, e conscientes da necessidade de os processos educativos colocarem tais dinâmicas em perspectiva, neste artigo voltamos nosso olhar para os hackers e a percepção que possuem sobre a possibilidade de vivência de elementos da sua cultura nas escolas. Compreender quais elementos da cultura hacker, na percepção dos hackers de distintos movimentos e países, deveriam fazer parte do ambiente escolar é o objetivo principal deste trabalho. Um quest
Los estilos APA, Harvard, Vancouver, ISO, etc.
31

Etuh, Emmanuel, Francis S. Bakpo, George E. Okereke, and David Omagu. "Exploratory Data Analysis and Feature Selection for Social Media Hackers Prediction Problem." Computer Science & Engineering: An International Journal 13, no. 4 (2023): 01–19. http://dx.doi.org/10.5121/cseij.2023.13401.

Texto completo
Resumen
In machine learning, the intelligence of a developed model is greatly influenced by the dataset used for the target domain on which the developed model will be deployed. Social media platform has experienced more of hackers’ attacks on the platform in recent time. To identify a hacker on the platform, there are two possible ways. The first is to use the activities of the user while the second is to use the supplied details the user registered the account with. To adequately identify a social media user as hacker proactively, there are relevant user details called features that can be used to d
Los estilos APA, Harvard, Vancouver, ISO, etc.
32

Ms., Apurva Saxena*1 &. Dr.Anubha Dubey2. "KERBEROS AUTHENTICATION MODEL FOR DATA SECURITY IN CLOUD COMPUTING USING HONEY-POT." GLOBAL JOURNAL OF ENGINEERING SCIENCE AND RESEARCHES 6, no. 8 (2019): 35–44. https://doi.org/10.5281/zenodo.3367428.

Texto completo
Resumen
A honey pot is a technique of cloud computing that is proposed for capturing hackers or tracking unusual methods of attack. This technique will seize, recognize and duplicate the hacker behavior. It works in a Cloud environment where anything like technology, tool, and the result can be offered as a service. Purveyors offer and deliver such services to their customers via the network. This paper presents the concept of a high-interaction honeypot, Kerberos authentication system as a service in a cloud environment to implement the benefits of, such service to ably distinguish between hackers an
Los estilos APA, Harvard, Vancouver, ISO, etc.
33

Ulrich, Frank, Sune Müller, and Stephen Flowers. "The Professionalization of Hackers: A Content Analysis of 30 Years of Hacker Communication." Communications of the Association for Information Systems 52 (2023): 988–1016. http://dx.doi.org/10.17705/1cais.05246.

Texto completo
Resumen
Underground hacking has evolved from its early countercultural roots to become a complex and varied phenomenon. By combining a historical review of the literature with a content analysis of 30 years of underground hacker communication, we show that hacking has evolved in three waves to embrace learning and creativity, intrusion and crime, as well as politics and cyberwarfare. We uncover a paradoxical relationship between hackers and society at large where underground hacking is considered a digital crime while at the same time inspiring and driving corporate innovation, cybersecurity, and even
Los estilos APA, Harvard, Vancouver, ISO, etc.
34

Turgeman-Goldschmidt, Orly. "Hackers' Accounts." Social Science Computer Review 23, no. 1 (2005): 8–23. http://dx.doi.org/10.1177/0894439304271529.

Texto completo
Los estilos APA, Harvard, Vancouver, ISO, etc.
35

Hathaway, Melissa. "Power Hackers." Scientific American 303, no. 4 (2010): 16. http://dx.doi.org/10.1038/scientificamerican1010-16.

Texto completo
Los estilos APA, Harvard, Vancouver, ISO, etc.
36

Butler, Janet. "Hackers Beware!" EDPACS 15, no. 9 (1988): 6–8. http://dx.doi.org/10.1080/07366988809450472.

Texto completo
Los estilos APA, Harvard, Vancouver, ISO, etc.
37

Papathéodorou, Aris. "Hackers ouverts." EcoRev' N° 16, no. 2 (2004): 57–61. http://dx.doi.org/10.3917/ecorev.016.0057.

Texto completo
Los estilos APA, Harvard, Vancouver, ISO, etc.
38

Stephenson, Peter. "Hiring Hackers." Information Systems Security 8, no. 2 (1999): 10–13. http://dx.doi.org/10.1201/1086/43305.8.2.19990601/31059.3.

Texto completo
Los estilos APA, Harvard, Vancouver, ISO, etc.
39

Crawley, Adrian. "Hiring hackers." Network Security 2016, no. 9 (2016): 13–15. http://dx.doi.org/10.1016/s1353-4858(16)30088-5.

Texto completo
Los estilos APA, Harvard, Vancouver, ISO, etc.
40

Ball, Philip. "Medical hackers." Lancet 388, no. 10044 (2016): 554–55. http://dx.doi.org/10.1016/s0140-6736(16)31223-5.

Texto completo
Los estilos APA, Harvard, Vancouver, ISO, etc.
41

Highland, Harold Joseph. "Hackers revisited." Computers & Security 7, no. 4 (1988): 339. http://dx.doi.org/10.1016/0167-4048(88)90565-2.

Texto completo
Los estilos APA, Harvard, Vancouver, ISO, etc.
42

Schneier, B. "Airplane hackers." IEEE Security & Privacy 1, no. 6 (2003): 92. http://dx.doi.org/10.1109/msecp.2003.1266367.

Texto completo
Los estilos APA, Harvard, Vancouver, ISO, etc.
43

Kera, Denisa, Zack Denfeld, and Cathrine Kramer. "Food Hackers." Gastronomica 15, no. 2 (2015): 49–56. http://dx.doi.org/10.1525/gfc.2015.15.2.49.

Texto completo
Resumen
The emergence of food collectives, as well as movements identifying with makerspace and hackerspace cultures such as Food Hacking Base and Hackteria, supports various experimental and playful practices, which are often participatory. We discuss a case study of foodhacking practices (the 2012 workshop in Prague on issues of spices and globalization) to identify the functions of such playful food prototypes. These practices paradoxically revive the original ideas of Jean Anthelme Brillat-Savarin’s 1825 The Physiology of Taste, fusing gastronomy with global politics, science, business, and even p
Los estilos APA, Harvard, Vancouver, ISO, etc.
44

Martínez-Cazalla, María Dolors. "Cazando hackers. Un regalo del ‘convidado de piedra’." Revista de Humanidades de Valparaíso, no. 12 (December 20, 2018): 115. http://dx.doi.org/10.22370/rhv.2018.12.1344.

Texto completo
Resumen
Podemos ser hackeados porque no hay preguntas indiscretas sino respuestas imprudentes. El objetivo principal de este artículo es aprender a crear las mejores respuestas posibles, las más prudentes, para permanecer los más seguros que podamos. Esto es lo que significa cazando hackers: pesar sobre qué pieza de información fue la relevante para el hacker y por qué lo fue esta y no, otra. Si podemos prever nuestras fisuras podremos mantener nuestra zona a salvo de los hackers. Con el fin de alcanzar este objetivo, analizaremos cómo funciona el lenguaje encriptado conocido como las Cartas Rusas. La
Los estilos APA, Harvard, Vancouver, ISO, etc.
45

Lange, Antoine, and Jean-François Henrotte. "Piratage éthique : mise à jour du cadre législatif pour une Belgique 2.0 ?" Pin Code N° 16, no. 4 (2023): 24–27. http://dx.doi.org/10.3917/pinc.016.0024.

Texto completo
Resumen
En septembre 2019, dans le numéro inaugural de cette revue, avaient été abordées plusieurs des grandes questions juridiques que pose le piratage éthique ou le hacking éthique 1 . Pour rappel, cette pratique consiste à s’infiltrer au travers des systèmes de sécurité informatique d’une organisation, afin d’identifier les vulnérabilités 2 de ces systèmes et de les signaler à leurs propriétaires. Dans la culture anglo-saxonne, on dénomme ces acteurs « White Hat hackers », par opposition aux « Black Hat hackers » qui exploitent les vulnérabilités découvertes 3 . La Belgique ayant introduit une réfo
Los estilos APA, Harvard, Vancouver, ISO, etc.
46

Asarudeen, S. Sheik, and R. Priya R. Priya. "Recruitment of Ethical Hackers." International Journal of Scientific Research 2, no. 1 (2012): 145–46. http://dx.doi.org/10.15373/22778179/jan2013/50.

Texto completo
Los estilos APA, Harvard, Vancouver, ISO, etc.
47

Aji, Brian Budi. "TINDAKAN KEJAHATAN CYBER CRIME DALAM BENTUK DEFACE WEBSITE." Cyber Security dan Forensik Digital 6, no. 1 (2023): 25–29. http://dx.doi.org/10.14421/csecurity.2023.6.1.4049.

Texto completo
Resumen
Deface website merupakan tindakan yang dilakukan oleh seorang hacker atau peretas dengan tujuan untuk merusak atau mengubah tampilan homepage sebuah website. Tindakan ini sering dilakukan untuk menodai reputasi organisasi atau individu, mengeksploitasi kerentanan dalam sistem keamanan, atau menyampaikan pesan politik atau ideologis. Mempertimbangkan permasalahan tersebut, artikel ini mengkaji evolusi kejahatan dunia maya dalam bentuk website yang terdegradasi dengan menggunakan metode tinjauan sistematis. Dalam diskusi ini dilakukan kajian sistematis dengan terlebih dahulu memilih dan menentuk
Los estilos APA, Harvard, Vancouver, ISO, etc.
48

Ferenț, Darius-Antoniu. "The impact of DoS (Denial of Service) cyberattacks on a Local Area Network (LAN)." Intelligence Info 1, no. 1 (2022): 124–29. http://dx.doi.org/10.58679/ii52272.

Texto completo
Resumen
In this paper I will highlight a modus operandi of hackers launching Denial of Service (DoS) cyberattacks. I will theoretically show how CAM Overflow and TCP SYN Flood attacks can be performed, using Kali Linux, a Linux distribution used by cyber criminals to launch MitM (Man-in-the-Middle) attacks, DoS attacks, observing traffic in a computer network, etc. Hackers can affect the functioning of devices on an organization’s local network (server, router, switch, etc.) by sending thousands of packets per second to the target device. CAM Overflow is an attack where a hacker aims to overcrowd the
Los estilos APA, Harvard, Vancouver, ISO, etc.
49

Darius-Antoniu, Ferenț. "The impact of DoS (Denial of Service) cyberattacks on a Local Area Network (LAN)." Intelligence Info 1, no. 1 (2023): 124–29. https://doi.org/10.58679/II52272.

Texto completo
Resumen
In this paper I will highlight a modus operandi of hackers launching Denial of Service (DoS) cyberattacks. I will theoretically show how CAM Overflow and TCP SYN Flood attacks can be performed, using Kali Linux, a Linux distribution used by cyber criminals to launch MitM (Man-in-the-Middle) attacks, DoS attacks, observing traffic in a computer network, etc. Hackers can affect the functioning of devices on an organization&rsquo;s local network (server, router, switch, etc.) by sending thousands of packets per second to the target device. CAM Overflow is an attack where a hacker aims to overcrow
Los estilos APA, Harvard, Vancouver, ISO, etc.
50

Nikitina, Svetlana. "Hackers as Tricksters of the Digital Age: Creativity in Hacker Culture." Journal of Popular Culture 45, no. 1 (2012): 133–52. http://dx.doi.org/10.1111/j.1540-5931.2011.00915.x.

Texto completo
Los estilos APA, Harvard, Vancouver, ISO, etc.
Ofrecemos descuentos en todos los planes premium para autores cuyas obras están incluidas en selecciones literarias temáticas. ¡Contáctenos para obtener un código promocional único!